VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges

VileRAT is a Python implant, part of an evasive and highly intricate attack campaign against foreign exchange and cryptocurrency trading companies. Continue reading VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges

Andariel deploys DTrack and Maui ransomware

Earlier, the CISA published an alert related to a Stairwell report, “Maui Ransomware.” Our data should openly help solidify the attribution of the Maui ransomware incident to the Korean-speaking APT Andariel, also known as Silent Chollima and Stonefly. Continue reading Andariel deploys DTrack and Maui ransomware

Luna and Black Basta — new ransomware for Windows, Linux and ESXi

This report discusses new ransomware, that targets Windows, Linux and ESXi systems: Luna written in Rust and Black Basta. Continue reading Luna and Black Basta — new ransomware for Windows, Linux and ESXi

The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact

In early 2022, we investigated an IIS backdoor called SessionManager. It has been used against NGOs, government, military and industrial organizations in Africa, South America, Asia, Europe, Russia and the Middle East. Continue reading The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact

The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs

We want to familiarize the reader with the different stages of ransomware deployment and provide a visual guide to defending against targeted ransomware attacks. Continue reading The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs

APT ToddyCat

ToddyCat is a relatively new APT actor responsible for multiple sets of attacks against high-profile entities in Europe and Asia. Its main distinctive signs are two formerly unknown tools that we call ‘Samurai backdoor’ and ‘Ninja Trojan’. Continue reading APT ToddyCat

‘Unpacking’ technical attribution and challenges for ensuring stability in cyberspace

How is technical attribution carried out? What are the key challenges in conducting reliable technical attribution? How can this be more accessible to the multitude of stakeholders? Below are our reflections on these questions. Continue reading ‘Unpacking’ technical attribution and challenges for ensuring stability in cyberspace

IT threat evolution Q1 2022

Kaspersky IT threat review in Q1 2022: activity of APTs such as MoonBounce, BlueNororff, Lazarus and Roaming Mantis, attacks against Ukraine, phishing kits, Okta hack and more. Continue reading IT threat evolution Q1 2022